Trump and Biden election apps ‘compromised' by hackers days after president told rally ‘nobody gets hacked’

A trio of Dutch hackers in 2016 claimed to have president’s Twitter account

Matt Mathers
Wednesday 21 October 2020 22:10
Comments
Highlights from Trump's rallies in Arizona

Both president Donald Trump and Democratic nominee Joe Biden's 2020 election apps can be easily hacked, security experts have claimed.

White hat hackers at the Norweigan security firm Promon say a common weakness in some mobile phone company's operating systems can be abused to access the two candidates' apps.

It came just days after Mr Trump, 74, falsely told a campaign rally in Tuscon, Arizona that "nobody gets hacked". In 2016, three Dutch hackers claimed to have breached the president's Twitter account.

"The president’s statement sadly reflects a widely believed sentiment that secure passwords will protect you from hackers and that hacking, in general, doesn’t affect the average citizen," said Promon chief technology officer Tom Lysemose Hansen.

"Sadly, this isn’t the case. Absolutely nothing is 'unhackable' and even the most secure, high profile accounts are vulnerable should the user fall victim to a phishing attack which seeks usernames and passwords."

"The claim that 'nobody gets hacked' is simply untrue and — given the influence of the president — can have dangerous impacts on the behaviour of hundreds of thousands of people," he added.

On Monday, the president told thousands of supporters at a Make American Great Again rally that it was extremely difficult for people to get hacked.

"To get hacked you need somebody with 197 IQ and he needs about 15 per cent of your password," he said.

He had been referring to the C-SPAN political editor Steve Scully, who was recently suspended after lying about his Twitter account getting hacked.

The technical skills required to breach the two campaign apps was minimal, according to Mr Hansen.

"Regardless of whether you are new to the world of hacking or are a world-leading security researcher, it is not difficult to hack these apps," he said.

"Due to this critical Android vulnerability being so well-known, hackers can easily hijack these apps and overlay fake screens".

Register for free to continue reading

Registration is a free and easy way to support our truly independent journalism

By registering, you will also enjoy limited access to Premium articles, exclusive newsletters, commenting, and virtual events with our leading journalists

Please enter a valid email
Please enter a valid email
Must be at least 6 characters, include an upper and lower case character and a number
Must be at least 6 characters, include an upper and lower case character and a number
Must be at least 6 characters, include an upper and lower case character and a number
Please enter your first name
Special characters aren’t allowed
Please enter a name between 1 and 40 characters
Please enter your last name
Special characters aren’t allowed
Please enter a name between 1 and 40 characters
You must be over 18 years old to register
You must be over 18 years old to register
Opt-out-policy
You can opt-out at any time by signing in to your account to manage your preferences. Each email has a link to unsubscribe.

By clicking ‘Create my account’ you confirm that your data has been entered correctly and you have read and agree to our Terms of use, Cookie policy and Privacy notice.

This site is protected by reCAPTCHA and the Google Privacy policy and Terms of service apply.

Already have an account? sign in

By clicking ‘Register’ you confirm that your data has been entered correctly and you have read and agree to our Terms of use, Cookie policy and Privacy notice.

This site is protected by reCAPTCHA and the Google Privacy policy and Terms of service apply.

Register for free to continue reading

Registration is a free and easy way to support our truly independent journalism

By registering, you will also enjoy limited access to Premium articles, exclusive newsletters, commenting, and virtual events with our leading journalists

Already have an account? sign in

By clicking ‘Register’ you confirm that your data has been entered correctly and you have read and agree to our Terms of use, Cookie policy and Privacy notice.

This site is protected by reCAPTCHA and the Google Privacy policy and Terms of service apply.

Join our new commenting forum

Join thought-provoking conversations, follow other Independent readers and see their replies

Comments

Thank you for registering

Please refresh the page or navigate to another page on the site to be automatically logged inPlease refresh your browser to be logged in